readings
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
readings [2020/10/30 14:59] – mnika | readings [2020/12/10 23:46] – Add readings, Lecture 12 (03.12 Thu.) sjoao | ||
---|---|---|---|
Line 47: | Line 47: | ||
===== Lecture 6.b (22.10 Thu.) ===== | ===== Lecture 6.b (22.10 Thu.) ===== | ||
=== Suggested (lecture 6.b): === | === Suggested (lecture 6.b): === | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{http:// | ||
===== Lecture 7.a (29.10 Thu.) ===== | ===== Lecture 7.a (29.10 Thu.) ===== | ||
=== Suggested (lecture 7.a): === | === Suggested (lecture 7.a): === | ||
Line 56: | Line 58: | ||
=== Suggested (lecture 7.b): === | === Suggested (lecture 7.b): === | ||
* {{https:// | * {{https:// | ||
+ | |||
+ | |||
+ | ===== Lecture 9 (12.11 Thu.) ===== | ||
+ | === Suggested (lecture 9.a): === | ||
+ | * {{http:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | |||
+ | === Suggested (lecture 9.b): === | ||
+ | * {{https:// | ||
+ | * {{barenghi2018softwareonly.pdf|A. Barenghiet al., “Software-Only Reverse Engineering of Physical DRAM Mappings for RowHammer Attacks,” inIVSW, 2018}} | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | USA, 2015}} | ||
+ | * {{http:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{khan2018analysis.pdf|Mohammad Khan and Swaroop Ghosh. " | ||
+ | |||
+ | ===== Lecture 10 (19.11 Thu.) ===== | ||
+ | === Suggested (lecture 10.a): === | ||
+ | * {{dpuf_sutar.pdf|S. Sutar, A. Raha, D. Kulkarni, R. Shorey, J. Tew, and V. Raghunathan, | ||
+ | * {{deterministic_encryption.pdf|M. Bellare, R. Dowsley, and S. Keelveedhi, "How Secure is Deterministic Encryption?" | ||
+ | * {{tehranipoor_robust_TRNG.pdf|F. Tehranipoor, | ||
+ | * {{keller_trng.pdf|C. Keller, F. Gurkaynak, H. Kaeslin, and N. Felber, “Dynamic Memory-based | ||
+ | Physically Unclonable Function for the Generation of Unique Identifiers and | ||
+ | True Random Numbers,” ISCAS, 2014.}} | ||
+ | |||
+ | === Suggested (lecture 10.b): === | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{dac19-aligns.pdf|S. Angizi, J. Sun, W. Zhang, D. Fan, " | ||
+ | * {{isca19-duality.pdf|D. Fujiki, S. Mahlke, R. Das, " | ||
+ | * {{https:// | ||
+ | * {{micro17-drisa.pdf| S. Li, D. Niu, K.T. Malladi, H. Zheng, B. Brennan, Y. Xie, " | ||
+ | * {{dac18-dracc.pdf| Q. Deng, L. Jiang, Y. Zhang, M. Zhang, J. Yang, " | ||
+ | |||
+ | |||
+ | ===== Lecture 12 (03.12 Thu.) ===== | ||
+ | === Suggested (lecture 12.a): === | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | * {{https:// | ||
+ | USA, 2015}} | ||
+ | * {{https:// | ||
+ | |||
+ | === Suggested (lecture 12.b): === | ||
+ | * {{ https:// | ||
+ | * {{ liu2013.pdf | Yu Liu, Yier Jin and Yiorgos Makris. " | ||
+ | * {{ trippel2020.pdf | Trippel, T., Shin, K.G., Bush, K.B. and Hicks, M., 2020, May. "ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans", | ||
+ | * {{ https:// | ||
readings.txt · Last modified: 2020/12/11 08:37 by alserm